Specifications
Motorola Solutions AP-7131N-FGR Access Point Product Reference Guide
4-24
4.5.3 Creating a Certificate for Onboard RADIUS Authentication
The access point can use its on-board RADIUS Server loaded with certificates to authenticate MUs.
AP can generate certificate request. In addition, a Windows 2008 Server is used to sign the certificate
before downloading it back to the access point’s on-board RADIUS server and loading the certificate
for use with the access point.
Both a CA and Self certificate are required for Onboard RADIUS Authentication. For information on
CA Certificates, see Importing a CA Certificate on page 4-18
.
Ensure the certificate is in a Base 64
Encoded format
or risk loading an invalid certificate.
To create a self certificate for on-board RADIUS authentication:
1. Select System Configuration -> Certificate Mgmt -> Self Certificates from the access
point menu tree.
2. Click on the Add button to create the certificate request.
The Certificate Request screen displays.
3. Complete the request form with the pertinent information.
NOTE If the access point is restarted after a certificate request has been
generated but before the signed certificate is imported, the import will not
execute properly. Do not restart the access point during this process.
CAUTION If using the RADIUS time-based authentication feature to
authenticate access point user permissions, ensure the access point’s
time is synchronized with the CA server used to generate certificate
requests.
CAUTION Self certificates can only be generated using the access point GUI and
CLI interfaces. No functionality exists for creating a self-certificate
using the access point’s SNMP configuration option.
Key ID (required) Enter a logical name for the certificate to help distinguish between
certificates. The name can be up to 7 characters in length.